Publication is\nthe conveyance of messages through video, audio, print or website. It is not as\nexhibiting a planned public occasion but it is a continuous\nsequence in which adjacent elements are not perceptibly different from each\nother, but the extremes are quite distinct. And the academic community should consent\nto receive this, not withstand\nthe action of it. This was one of the main interference of a recent workshop.\nIt is an act of publishing.\n\n\n\nTypically a\nscientific paper is supposed to be published only after it is appeared in paper\njournal. Publication might be described the nature to the consequence by raising\nto the higher position of an official ban on trade. But even in the past,\npredigital world publication was not accurate. Authors often circulated drafts\nof their papers to colleagues, presented their findings at meetings, and\npublished abstracts months or even years before publishing their papers in peer\nreviewed journals. \n\n\n\nInvasion of\nprivacy is an act of being exposed to the possibility of being\nattacked or harmed, either physically or emotionally. That is privacy is\nending. The confidential\ndetails of your life regarding address, contact numbers, social security\nnumber, bank details and other records are readily available to anyone who tries\nto find for it. Though our present advanced technologies have brought us all\nways of convenience but it has made us more unsafe than ever. You are\nunprotected even if you don\u2019t use computer.\n\n\n\nThe\ncontents of invasion of privacy.\n\n\n\nThe worst thing about being famous is the invasion of privacy.Privacy is an absolute prerequisite and not to be merely entitles by\nanyone.FB is the invasion of everyone\u2019s privacy.Invasion privacy is not a national ID card but number of other\nthings.The constant invasion is becoming a Real concern.\n\n\n\nWays of publication of self-Invasion\nof Privacy\n\n\n\nBankers sell detailed account information to telemarketers at\nuniform intervals. \n\n\n\nThe problem of fraud credit card has been created due mystery purchasing\nprovided by the Internet.\n\n\n\nLawbreaker can steal your recognition to torture up debt, and commit\nother crimes using your social security number. \n\nPerson who hunts game stealthily have new windows to break into your\nlife.\n\nThe federal government inspects your every transaction and have the\nright to hold your assets to investigate to consider any observed behaviour\nthat could indicate terrorism \u2013related crime. \n\nThe employers observe the employee by a definite pattern in the\nworkplace and evaluate their quality as per their background information collected\nwithout the applicants\u2019 knowledge.\n\n\n\n\n\nRemedies to protect Invasion\nof Privacy in digital age\n\n\n\nWe should set up our\ncomputer and Internet connection for the utmost privacy and security.\nAvoid sharing your Social Security number nor participate it.We should not carry\ncredit cards, pin numbers, social security number, gift cards, blank cheques\nand passport in your wallet.Should be aware of\nthe internet knowledge and also keep your financial and medical records\nprivate.\n\n\n\n\n\nNow-d-days government has been using higher technology systems to observe\npractically every mediation of any kind, including phone calls, e-mails, Internet\ndownloads, and faxes.